Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55423: n/a

0
Critical
VulnerabilityCVE-2025-55423cvecve-2025-55423
Published: Tue Jan 20 2026 (01/20/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-55423 is an OS command injection vulnerability affecting multiple ipTIME router models across various firmware versions. The flaw exists in the upnp_relay() function, allowing attackers to execute arbitrary OS commands remotely. Exploitation does not require authentication, increasing the risk of compromise. Although no known exploits are currently reported in the wild, the broad range of affected devices and firmware versions makes this a significant threat. European organizations using ipTIME routers could face confidentiality, integrity, and availability risks if targeted. Mitigation requires prompt firmware updates once patches are available and network segmentation to limit exposure. Countries with higher adoption of ipTIME routers and critical infrastructure relying on these devices are at greater risk. Given the potential for remote code execution without authentication, the severity is assessed as critical. Defenders should prioritize detection of anomalous UPnP traffic and restrict UPnP exposure to untrusted networks.

AI-Powered Analysis

AILast updated: 01/20/2026, 18:06:30 UTC

Technical Analysis

CVE-2025-55423 is a critical OS command injection vulnerability identified in the upnp_relay() function of ipTIME routers, impacting a wide range of models and firmware versions from approximately 10.00.6 to 14.19.4 depending on the device. The vulnerability allows an unauthenticated remote attacker to inject and execute arbitrary operating system commands on the affected device by exploiting the Universal Plug and Play (UPnP) relay functionality. This flaw arises due to insufficient input validation or sanitization in the upnp_relay() function, which processes UPnP requests. Successful exploitation can lead to full compromise of the router, enabling attackers to manipulate network traffic, deploy malware, pivot into internal networks, or disrupt services. The vulnerability affects numerous ipTIME models including A2003NS-MU, N600, A604-V3, A6ns-M, V508, N704QCA, and many others, covering a broad firmware version range. No CVSS score has been assigned yet, and no public exploits are known, but the nature of the vulnerability and the affected devices' widespread use in home and small business environments make this a high-risk issue. The vulnerability's exploitation requires no authentication and can be triggered remotely, increasing its threat level. The lack of available patches at the time of disclosure necessitates immediate defensive measures to mitigate risk.

Potential Impact

The impact of CVE-2025-55423 on European organizations can be substantial. Compromise of ipTIME routers through this vulnerability can lead to unauthorized access to internal networks, interception or manipulation of sensitive data, disruption of network availability, and potential deployment of persistent malware. Organizations relying on these routers for internet connectivity or as part of their network infrastructure may experience data breaches, operational downtime, and erosion of trust. Small and medium enterprises, as well as residential users in Europe using ipTIME devices, are particularly vulnerable due to potentially limited security monitoring and patch management capabilities. The ability to execute arbitrary OS commands remotely without authentication means attackers can fully control the device, bypassing perimeter defenses. This can facilitate lateral movement within corporate networks or serve as a foothold for further attacks. Additionally, critical infrastructure sectors using these routers could face heightened risks, including service outages and data integrity issues. The broad firmware version range affected increases the scope of vulnerable devices, amplifying potential impact across multiple European countries.

Mitigation Recommendations

1. Immediate network-level mitigation: Block or restrict UPnP traffic from untrusted external networks at the perimeter firewall to prevent remote exploitation attempts. 2. Disable UPnP on ipTIME routers if not required, as this reduces the attack surface significantly. 3. Monitor network traffic for unusual or unexpected UPnP requests that could indicate exploitation attempts. 4. Segment networks to isolate vulnerable routers from critical systems and sensitive data, limiting potential lateral movement. 5. Engage with ipTIME or authorized vendors to obtain and apply firmware updates as soon as patches addressing this vulnerability are released. 6. Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting UPnP command injection patterns. 7. Educate users and administrators about the risks of UPnP exposure and the importance of timely patching. 8. Conduct regular vulnerability assessments on network devices to identify unpatched or misconfigured routers. These steps go beyond generic advice by focusing on UPnP-specific controls, network segmentation, and proactive monitoring tailored to the nature of the vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-13T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696fc0884623b1157c42b9f5

Added to database: 1/20/2026, 5:51:04 PM

Last enriched: 1/20/2026, 6:06:30 PM

Last updated: 1/20/2026, 6:59:41 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats